Vulnerabilities in pikepdf 2.9.2